Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13109: CWE-639 Authorization Bypass Through User-Controlled Key in realmag777 HUSKY – Products Filter Professional for WooCommerce

0
Medium
VulnerabilityCVE-2025-13109cvecve-2025-13109cwe-639
Published: Wed Dec 03 2025 (12/03/2025, 12:29:56 UTC)
Source: CVE Database V5
Vendor/Project: realmag777
Product: HUSKY – Products Filter Professional for WooCommerce

Description

The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.7.2 via the "woof_add_query" and "woof_remove_query" functions due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with subscriber level access and above, to insert or remove arbitrary saved search queries into any user's profile, including administrators.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:30:59 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13109 affects the HUSKY – Products Filter Professional for WooCommerce plugin, a WordPress extension used to enhance product filtering capabilities in WooCommerce stores. The flaw is categorized under CWE-639, which involves authorization bypass through user-controlled keys. Specifically, the plugin's functions woof_add_query and woof_remove_query fail to properly validate keys supplied by authenticated users. This lack of validation allows attackers with subscriber-level privileges or higher to manipulate saved search queries in other users' profiles, including those of administrators. Such manipulation can alter the behavior of the plugin or the user experience by injecting or removing saved queries without proper authorization. Although the vulnerability does not expose sensitive data or disrupt service availability, it compromises the integrity of user-specific configurations. The attack vector is remote and network-based, requiring only low complexity and no user interaction beyond authentication. The vulnerability affects all versions up to and including 1.3.7.2 of the plugin. No patches or exploit code are currently publicly available, but the risk remains due to the widespread use of WooCommerce and this plugin in e-commerce environments.

Potential Impact

The primary impact of this vulnerability is the unauthorized modification of saved search queries within user profiles, including those of administrators. This can lead to confusion, misconfiguration, or potential indirect exploitation if attackers use manipulated queries to influence plugin behavior or user decisions. While confidentiality and availability are not directly affected, the integrity of user data and configurations is compromised. For organizations, this could result in degraded user trust, potential disruption of e-commerce operations, and increased risk of further attacks if attackers leverage this foothold for privilege escalation or lateral movement. Since the vulnerability requires authenticated access at subscriber level or above, the risk is higher in environments with weak access controls or where subscriber accounts are easily compromised or created. The medium CVSS score reflects moderate risk, but the potential for misuse in targeted attacks against high-value WordPress sites is notable.

Mitigation Recommendations

Organizations should immediately verify if they use the HUSKY – Products Filter Professional for WooCommerce plugin and identify the version in use. Since no official patch links are currently available, administrators should consider the following mitigations: 1) Restrict subscriber-level account creation and monitor for suspicious account activity to reduce the attack surface. 2) Implement strict role-based access controls and audit user permissions regularly. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block anomalous requests targeting the woof_add_query and woof_remove_query endpoints. 4) Monitor logs for unusual modifications to saved queries or profile data. 5) Engage with the plugin vendor or community to obtain or develop patches and apply them promptly once available. 6) Consider temporarily disabling the plugin or limiting its functionality if feasible until a fix is deployed. 7) Educate administrators and users about the risk and signs of exploitation to enable rapid response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-12T23:36:07.758Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69302ef1720cedca79452381

Added to database: 12/3/2025, 12:37:05 PM

Last enriched: 2/27/2026, 9:30:59 AM

Last updated: 3/23/2026, 5:45:52 AM

Views: 178

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses